Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 02:17

General

  • Target

    3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe

  • Size

    335KB

  • MD5

    2e01c152b22c13fb946c204b6875a2d8

  • SHA1

    20f7a049f779623a11b4fbfb300c1f7a380fb33b

  • SHA256

    3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5

  • SHA512

    80dc80d22ecb90d3c58c40e112de882548a1d933937d851993af4e6a92746900283770bd09d88047bd79fa053600113d1f9bb42a6af5beefe00b3ee15d4e7310

  • SSDEEP

    6144:MEbVUO1x/5bTgVziHzZnSKrCbYMJAbB8+q:lr/5/gVziHlBrCbYx83

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
        PID:480
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:596
          • C:\Windows\system32\wbem\wmiprvse.exe
            C:\Windows\system32\wbem\wmiprvse.exe
            3⤵
            • Drops file in System32 directory
            PID:1728
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            3⤵
              PID:1784
            • C:\Windows\system32\wbem\wmiprvse.exe
              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              3⤵
                PID:1848
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k RPCSS
              2⤵
                PID:676
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                2⤵
                • Modifies security service
                PID:752
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                2⤵
                  PID:808
                  • C:\Windows\system32\Dwm.exe
                    "C:\Windows\system32\Dwm.exe"
                    3⤵
                      PID:1204
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:840
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService
                    2⤵
                      PID:960
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      2⤵
                        PID:268
                      • C:\Windows\System32\spoolsv.exe
                        C:\Windows\System32\spoolsv.exe
                        2⤵
                          PID:1000
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                          2⤵
                            PID:492
                          • C:\Windows\system32\taskhost.exe
                            "taskhost.exe"
                            2⤵
                              PID:1100
                            • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                              "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                              2⤵
                                PID:892
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                2⤵
                                  PID:1936
                                • C:\Windows\system32\sppsvc.exe
                                  C:\Windows\system32\sppsvc.exe
                                  2⤵
                                    PID:1328
                                • C:\Windows\system32\lsass.exe
                                  C:\Windows\system32\lsass.exe
                                  1⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:488
                                • C:\Windows\system32\lsm.exe
                                  C:\Windows\system32\lsm.exe
                                  1⤵
                                    PID:496
                                  • C:\Windows\Explorer.EXE
                                    C:\Windows\Explorer.EXE
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:1252
                                    • C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe
                                      "C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe"
                                      2⤵
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1956
                                      • C:\Users\Admin\AppData\Local\Temp\bu3p4cvq.l0q.exe
                                        "C:\Users\Admin\AppData\Local\Temp\bu3p4cvq.l0q.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:2192
                                      • C:\Windows\system32\SCHTASKS.exe
                                        "SCHTASKS.exe" /create /tn "Mason3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe'" /sc onlogon /rl HIGHEST
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2008
                                      • C:\Windows\system32\SCHTASKS.exe
                                        "SCHTASKS.exe" /create /tn "Mason3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe'" /sc onlogon /rl HIGHEST
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2108
                                      • C:\Windows\system32\netsh.exe
                                        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" "3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" ENABLE
                                        3⤵
                                        • Modifies Windows Firewall
                                        • Event Triggered Execution: Netsh Helper DLL
                                        PID:292
                                  • C:\Windows\system32\conhost.exe
                                    \??\C:\Windows\system32\conhost.exe "-424255409-462365627390218131889958930-1564690863-1045726090-1027785048-818790376"
                                    1⤵
                                      PID:2428
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "-764231210-1856558887-770570776-7437232501231795292-1549837207-1792649193-1056161669"
                                      1⤵
                                        PID:1676

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • \Users\Admin\AppData\Local\Temp\bu3p4cvq.l0q.exe

                                        Filesize

                                        161KB

                                        MD5

                                        94f1ab3a068f83b32639579ec9c5d025

                                        SHA1

                                        38f3d5bc5de46feb8de093d11329766b8e2054ae

                                        SHA256

                                        879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                        SHA512

                                        44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                      • memory/432-16-0x0000000000CD0000-0x0000000000CFB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/432-17-0x000007FEBEE40000-0x000007FEBEE50000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/432-14-0x0000000000C00000-0x0000000000C25000-memory.dmp

                                        Filesize

                                        148KB

                                      • memory/432-18-0x0000000037620000-0x0000000037630000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/432-55-0x0000000000CD0000-0x0000000000CFB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/432-57-0x0000000077631000-0x0000000077632000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/480-76-0x0000000000160000-0x000000000018B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/480-162-0x0000000000160000-0x000000000018B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/480-98-0x0000000000160000-0x000000000018B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/480-77-0x000007FEBEE40000-0x000007FEBEE50000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/488-67-0x0000000000060000-0x000000000008B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/488-153-0x0000000000060000-0x000000000008B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/488-27-0x0000000037620000-0x0000000037630000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/488-61-0x0000000000030000-0x0000000000055000-memory.dmp

                                        Filesize

                                        148KB

                                      • memory/488-25-0x0000000000060000-0x000000000008B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/488-26-0x000007FEBEE40000-0x000007FEBEE50000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/492-163-0x0000000000370000-0x000000000039B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/596-85-0x0000000000560000-0x000000000058B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/596-158-0x0000000000560000-0x000000000058B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/752-93-0x0000000000E00000-0x0000000000E2B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1956-2-0x0000000000140000-0x000000000016C000-memory.dmp

                                        Filesize

                                        176KB

                                      • memory/1956-0-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1956-140-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1956-1-0x0000000000DF0000-0x0000000000E4A000-memory.dmp

                                        Filesize

                                        360KB

                                      • memory/1956-206-0x0000000000790000-0x000000000079E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/1956-207-0x000000001B680000-0x000000001B700000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/1956-259-0x000000001B680000-0x000000001B700000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2192-40-0x00000000775E0000-0x0000000077789000-memory.dmp

                                        Filesize

                                        1.7MB

                                      • memory/2192-12-0x00000000774C0000-0x00000000775DF000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2192-11-0x00000000775E0000-0x0000000077789000-memory.dmp

                                        Filesize

                                        1.7MB

                                      • memory/2192-13-0x00000000775E1000-0x00000000776E2000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/2192-136-0x00000000775E0000-0x0000000077789000-memory.dmp

                                        Filesize

                                        1.7MB